Tech-invite3GPPspaceIETF RFCsSIP
Quick21222324252627282931323334353637384‑5x

Content for  TS 33.222  Word version:  17.1.0

Top   Top   Up   Prev   None
0…   4…

 

4  Overview of the Security ArchitectureWord‑p. 8

5  Authentication schemesWord‑p. 9

5.1  Reference modelWord‑p. 9

5.2  General requirements and principlesWord‑p. 9

5.3  Shared key-based UE authentication with certificate-based NAF authenticationWord‑p. 10

5.4  Shared key-based mutual authentication between UE and NAFWord‑p. 13

5.5  Certificate based mutual authentication between UE and application serverWord‑p. 16

5.5.1  General |R7|Word‑p. 16

5.5.2  TLS Profile |R7|Word‑p. 16

6  Use of Authentication ProxyWord‑p. 18

A  Technical Solutions for Access to Application Servers via Authentication Proxy and HTTPSWord‑p. 23

B  Guidance on Certificate-based mutual authentication between UE and application serverWord‑p. 24

C  Considerations for GBA security using a web browser and Javascript |R12|Word‑p. 25

D (Normative)  Security measures for usage of GBA with a web browser |R12|Word‑p. 29

$  Change historyWord‑p. 36


Up   Top